Latest from the Blog
Managing a Data Breach: Insights from FinTechSec Solutions Inc.’s Experience
This blog post offers a detailed case study of FinTechSec Solutions Inc., a fintech company, as they encounter and address a data breach. The post covers responses, communication protocols, data breach regulations, investigation, remediation measures, recovery plan, and lessons learned. It provides valuable insights into breach management complexities and includes an example Cybersecurity Incident Response…
Keep readingThe Essential Guide to Role-Based Access Control
Are you looking to improve the security and efficiency of your organisation’s access control system? Then you might want to consider implementing Role-Based Access Control (RBAC). In this blog post, we will explain what RBAC is, how it works, and why it is an effective method for managing access rights. We will also discuss some…
Keep readingShould I use Chocolatey or Winget?
I have been asked a few times now about the differences between Chocolatey and Winget. So, I thought I would lay out a few things that hopefully answer that question.
Keep readingAdding users to AD Security Groups with PowerShell
Adding a user to many security groups in Active Directory using PowerShell is simple. You can use the Add-ADPrincipalGroupMembership cmdlet. This cmdlet allows you to add a user to one or more security groups. Here’s an example of how you might use this cmdlet (this is an OK solution): The Add-ADPrincipalGroupMembership cmdlet, is used inside…
Keep readingGetting security group memberships for the currently logged in user – with PowerShell
If you need to check if a security group membership has been applied to a current user, you can run the following PowerShell command to get the group memberships from the current Kerberos Token: (([System.Security.Principal.WindowsIdentity]::GetCurrent()).Groups) | %{Write-Host (($_).Translate([System.Security.Principal.NTAccount]))}
Keep readingWhy Account Lifecycle Management is Important!
It is increasingly important that organisation start taking account lifecycle management more seriously. Ask yourself these questions: Do any of your departed users have access to your systems still? One more time. Do you know, for sure, if any of your departed user have access to your systems still? My experience has taught me that…
Keep readingStudying for CISSP
I can’t remember the last time I had this much fun studying for a certification! Really digging the content.
Keep readingglenn@tcs:~$ whoami
Hello. Hallo. Bonjour. Guten Tag. Kónnichi wa. Olá. Jambo. I’m Glenn. I am a proud father, Husband and a geek at heart. I love tech and always want to keep learning. I have been in the tech industry for around 20 years now. I have learnt a lot of lessons along the way. Despite the…
Keep reading